Radar #4: This week's topics: Python Digital Attestations, The Fate of CISA, and more
Learn more about The Radar here
PyPI, the repository searched by the pip
command for packages, announced it now supports digital attestations – a method for cryptographically verifying a Python package to the repository it came from. This is generally a step in the right direction, but there have been discussions about how this impacts supply chain security. While this can allow for knowing where a package came from it is very important to note that digital attestations only guarantees who a package came from, this would not have any effect on supply chain attacks that target the build process such as the (in)famous SolarWinds attack which was attacked before any form of digital attestation would be created.
The documentation is very clear about this. Still, it will likely fall on security folks to continue to spread awareness that just because a package is digitally attested to does not mean the actual code is any more trustworthy than one that is not. For further reading I recommend the Trail Of Bits blog and the PyPI Security Model documentation.
There has been a lot of fear-mongering about CISA being eliminated, while this is undoubtedly a terrible idea, I don’t think it’s something we should entertain as a reality. CISA does a lot of fantastic non-partisan work. The quote being circulated is “I’d like to eliminate it, The First Amendment is pretty important, that’s why we listed it as the First Amendment, and I would have liked to, at the very least, eliminate their ability to censor content online”. It should be noted that while CISA does release information about hot topics such as election security, they have had consistent messaging regarding election security in both 2024 and 2020 elections. Transparency that doesn’t push certain objectives does not equal censorship.
One of the most important reasons CISA is effective is not because it can impose cyber restrictions on companies, but because CISA produces reports and resources security leaders at companies can leverage to drive change in their organization. My absolute favorite use of CISA resources is to take a CISA report, extract all the MITRE ATTACK techniques from it, run those techniques using Atomic Red Team, then analyze the results to understand if this attack would have been caught. If not, that’s a great data-point to use in a report to executive leaders of why additional resources are needed. Here are some of my favorite resources from CISA:
Want this sent straight to your inbox? You can subscribe here to have it sent every Monday morning.